Author: delphij
Date: Tue Jan 27 19:36:08 2015
New Revision: 277807
URL: https://svnweb.freebsd.org/changeset/base/277807

Log:
  Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerability
  and SCTP stream reset vulnerability.
  
  Security:     FreeBSD-SA-15:02.kmem
  Security:     CVE-2014-8612
  Security:     FreeBSD-SA-15:03.sctp
  Security:     CVE-2014-8613

Modified:
  stable/10/sys/netinet/sctp_input.c
  stable/10/sys/netinet/sctp_usrreq.c

Changes in other areas also in this revision:
Modified:
  stable/8/sys/netinet/sctp_input.c
  stable/8/sys/netinet/sctp_usrreq.c
  stable/9/sys/netinet/sctp_input.c
  stable/9/sys/netinet/sctp_usrreq.c

Modified: stable/10/sys/netinet/sctp_input.c
==============================================================================
--- stable/10/sys/netinet/sctp_input.c  Tue Jan 27 19:35:41 2015        
(r277806)
+++ stable/10/sys/netinet/sctp_input.c  Tue Jan 27 19:36:08 2015        
(r277807)
@@ -3664,6 +3664,9 @@ sctp_handle_stream_reset_response(struct
                                        /* huh ? */
                                        return (0);
                                }
+                               if (ntohs(respin->ph.param_length) < 
sizeof(struct sctp_stream_reset_response_tsn)) {
+                                       return (0);
+                               }
                                if (action == 
SCTP_STREAM_RESET_RESULT_PERFORMED) {
                                        resp = (struct 
sctp_stream_reset_response_tsn *)respin;
                                        asoc->stream_reset_outstanding--;
@@ -4052,7 +4055,7 @@ __attribute__((noinline))
            sctp_handle_stream_reset(struct sctp_tcb *stcb, struct mbuf *m, int 
offset,
         struct sctp_chunkhdr *ch_req)
 {
-       int chk_length, param_len, ptype;
+       uint16_t remaining_length, param_len, ptype;
        struct sctp_paramhdr pstore;
        uint8_t cstore[SCTP_CHUNK_BUFFER_SIZE];
        uint32_t seq = 0;
@@ -4065,7 +4068,7 @@ __attribute__((noinline))
        int num_param = 0;
 
        /* now it may be a reset or a reset-response */
-       chk_length = ntohs(ch_req->chunk_length);
+       remaining_length = ntohs(ch_req->chunk_length) - sizeof(struct 
sctp_chunkhdr);
 
        /* setup for adding the response */
        sctp_alloc_a_chunk(stcb, chk);
@@ -4103,20 +4106,27 @@ strres_nochunk:
        ch->chunk_length = htons(chk->send_size);
        SCTP_BUF_LEN(chk->data) = SCTP_SIZE32(chk->send_size);
        offset += sizeof(struct sctp_chunkhdr);
-       while ((size_t)chk_length >= sizeof(struct 
sctp_stream_reset_tsn_request)) {
+       while (remaining_length >= sizeof(struct sctp_paramhdr)) {
                ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, 
sizeof(pstore), (uint8_t *) & pstore);
-               if (ph == NULL)
+               if (ph == NULL) {
+                       /* TSNH */
                        break;
+               }
                param_len = ntohs(ph->param_length);
-               if (param_len < (int)sizeof(struct 
sctp_stream_reset_tsn_request)) {
-                       /* bad param */
+               if ((param_len > remaining_length) ||
+                   (param_len < (sizeof(struct sctp_paramhdr) + 
sizeof(uint32_t)))) {
+                       /* bad parameter length */
                        break;
                }
-               ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, 
min(param_len, (int)sizeof(cstore)),
+               ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, 
min(param_len, sizeof(cstore)),
                    (uint8_t *) & cstore);
+               if (ph == NULL) {
+                       /* TSNH */
+                       break;
+               }
                ptype = ntohs(ph->param_type);
                num_param++;
-               if (param_len > (int)sizeof(cstore)) {
+               if (param_len > sizeof(cstore)) {
                        trunc = 1;
                } else {
                        trunc = 0;
@@ -4128,6 +4138,9 @@ strres_nochunk:
                if (ptype == SCTP_STR_RESET_OUT_REQUEST) {
                        struct sctp_stream_reset_out_request *req_out;
 
+                       if (param_len < sizeof(struct 
sctp_stream_reset_out_request)) {
+                               break;
+                       }
                        req_out = (struct sctp_stream_reset_out_request *)ph;
                        num_req++;
                        if (stcb->asoc.stream_reset_outstanding) {
@@ -4141,12 +4154,18 @@ strres_nochunk:
                } else if (ptype == SCTP_STR_RESET_ADD_OUT_STREAMS) {
                        struct sctp_stream_reset_add_strm *str_add;
 
+                       if (param_len < sizeof(struct 
sctp_stream_reset_add_strm)) {
+                               break;
+                       }
                        str_add = (struct sctp_stream_reset_add_strm *)ph;
                        num_req++;
                        sctp_handle_str_reset_add_strm(stcb, chk, str_add);
                } else if (ptype == SCTP_STR_RESET_ADD_IN_STREAMS) {
                        struct sctp_stream_reset_add_strm *str_add;
 
+                       if (param_len < sizeof(struct 
sctp_stream_reset_add_strm)) {
+                               break;
+                       }
                        str_add = (struct sctp_stream_reset_add_strm *)ph;
                        num_req++;
                        sctp_handle_str_reset_add_out_strm(stcb, chk, str_add);
@@ -4171,6 +4190,9 @@ strres_nochunk:
                        struct sctp_stream_reset_response *resp;
                        uint32_t result;
 
+                       if (param_len < sizeof(struct 
sctp_stream_reset_response)) {
+                               break;
+                       }
                        resp = (struct sctp_stream_reset_response *)ph;
                        seq = ntohl(resp->response_seq);
                        result = ntohl(resp->result);
@@ -4182,7 +4204,11 @@ strres_nochunk:
                        break;
                }
                offset += SCTP_SIZE32(param_len);
-               chk_length -= SCTP_SIZE32(param_len);
+               if (remaining_length >= SCTP_SIZE32(param_len)) {
+                       remaining_length -= SCTP_SIZE32(param_len);
+               } else {
+                       remaining_length = 0;
+               }
        }
        if (num_req == 0) {
                /* we have no response free the stuff */

Modified: stable/10/sys/netinet/sctp_usrreq.c
==============================================================================
--- stable/10/sys/netinet/sctp_usrreq.c Tue Jan 27 19:35:41 2015        
(r277806)
+++ stable/10/sys/netinet/sctp_usrreq.c Tue Jan 27 19:36:08 2015        
(r277807)
@@ -1854,8 +1854,9 @@ flags_out:
                        SCTP_CHECK_AND_CAST(av, optval, struct 
sctp_stream_value, *optsize);
                        SCTP_FIND_STCB(inp, stcb, av->assoc_id);
                        if (stcb) {
-                               if 
(stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, 
&stcb->asoc.strmout[av->stream_id],
-                                   &av->stream_value) < 0) {
+                               if ((av->stream_id >= stcb->asoc.streamoutcnt) 
||
+                                   
(stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, 
&stcb->asoc.strmout[av->stream_id],
+                                   &av->stream_value) < 0)) {
                                        SCTP_LTRACE_ERR_RET(inp, NULL, NULL, 
SCTP_FROM_SCTP_USRREQ, EINVAL);
                                        error = EINVAL;
                                } else {
@@ -3915,8 +3916,9 @@ sctp_setopt(struct socket *so, int optna
                        SCTP_CHECK_AND_CAST(av, optval, struct 
sctp_stream_value, optsize);
                        SCTP_FIND_STCB(inp, stcb, av->assoc_id);
                        if (stcb) {
-                               if 
(stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, 
&stcb->asoc.strmout[av->stream_id],
-                                   av->stream_value) < 0) {
+                               if ((av->stream_id >= stcb->asoc.streamoutcnt) 
||
+                                   
(stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, 
&stcb->asoc.strmout[av->stream_id],
+                                   av->stream_value) < 0)) {
                                        SCTP_LTRACE_ERR_RET(inp, NULL, NULL, 
SCTP_FROM_SCTP_USRREQ, EINVAL);
                                        error = EINVAL;
                                }
@@ -3926,10 +3928,12 @@ sctp_setopt(struct socket *so, int optna
                                        SCTP_INP_RLOCK(inp);
                                        LIST_FOREACH(stcb, 
&inp->sctp_asoc_list, sctp_tcblist) {
                                                SCTP_TCB_LOCK(stcb);
-                                               
stcb->asoc.ss_functions.sctp_ss_set_value(stcb,
-                                                   &stcb->asoc,
-                                                   
&stcb->asoc.strmout[av->stream_id],
-                                                   av->stream_value);
+                                               if (av->stream_id < 
stcb->asoc.streamoutcnt) {
+                                                       
stcb->asoc.ss_functions.sctp_ss_set_value(stcb,
+                                                           &stcb->asoc,
+                                                           
&stcb->asoc.strmout[av->stream_id],
+                                                           av->stream_value);
+                                               }
                                                SCTP_TCB_UNLOCK(stcb);
                                        }
                                        SCTP_INP_RUNLOCK(inp);
_______________________________________________
svn-src-stable-10@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/svn-src-stable-10
To unsubscribe, send any mail to "svn-src-stable-10-unsubscr...@freebsd.org"

Reply via email to